BDB Podcast Ep:14 “Data… Are we using it ethically and are we securing it appropriately?”

Big Data Beard Podcast Episode 14
Title: Data… Are we using it ethically and are we securing it appropriately?
Host: Erin K. Banks
Co-Host: Brett Roberts & Rob Hout
Guest: Carey James

 

In episode 14 of the Big Data Beard Podcast Erin, Brett, and Rob talk with special guest Carey James, VP of Alliances at BlueTalon about all things data security.  Whether it is companies using the data for good or bad, we discuss the ethical implications of data and it’s use in analytics. We will also review how countries are dealing with data privacy issues through regulations like the EU, implementing General Data Protection Regulations (GDPR). Does it really have an impact, can we change the regulation down the road as innovation evolves or will it hinder innovation in the long run?

 

Carey also discusses BlueTalon and his career focused on data and the key to unlocking self service analytics. BlueTalon provides data access control to protect data and policy enforcement models to allow people to have more control and enforcement across multiple data platforms. They also help customers with data mobility and putting data on the right data platform in order to provide the right fit, right cost, and right analysis. Carey discusses the key to self service analytics and mobility, being access control and how BlueTalon has a part in that.

 

Check out a transcription of our episode on Github!

 

Transcript

Erin K. Banks:
[0:00] We’re back with another episode of the big date of beard podcast where we explore the trends technology and talented people making big data a big deal just want to make it clear I do not,
have a beard and my name is iron banks and we have on the podcast with us today at Brett Roberts.
Brett Roberts:
[0:17] Hey how’s it going doing great.
ErinK. Banks:
[0:18] Good and you awesome and Rob Howe.
Rob Hout:
[0:22] How’s it going.
ErinK. Banks:
[0:24] Good how’s it going with you.
Rob Hout:
[0:26] Perfect a grey rainy skies in Seattle that’s just what you ask for.
ErinK. Banks:
[0:30] Doesn’t get any better than that and our guest on the show is Carey James who’s the VP alliances at Blue Talon I carry.
Carey James:
[0:39] Hey Erin how are you today.
ErinK. Banks:
[0:41] I hope everyone’s getting ready for Thanksgiving and having a lovely lovely holiday if I forgot to mention it even though this will be posted after the holiday hopefully everyone’s back at the gym hanging out and visit so that way I know I’ll need to but before we start that process I just want to bring up a couple of news Topix,
that have caught my eye recently one of them.
[1:04] As I start working on my own job as part of a doing some messaging for AI and machine learning and deep-learning and a lot of the concepts are the concerns over privacy associate so there was a really great video that I saw and it was just talking about the fact of.
[1:21] I can come up with the concept of whether or not we understand the implications of privacy and what a i and how it’s being used and the impact it will have on our lives in general I don’t just was curious about everyone’s kind of thought on that about where they kind of feel if they’re kind of concerned about the AI and privacy and all those different aspects are up there like totally fine with it and,
I think that the benefit outweighs the risk.
Carey James:
[1:45] So there is a couple things there in time so the first one is his with a I write a lot of the artificial intelligence and deep learning functions were built to generate information and so it’s not so much about.
The they weren’t designed for privacy rights and now we’re actually trying to get deep learning and understand context around,
the customer and their relationship with that customer with the data,
I think that’s where that the big pieces going to come into play is do we have contacts around how we’re actually trying to protect the privacy of information so an algorithm that’s designed to do population Health Care,
is one thing versus a that same deep learning algorithm now aimed at a specific individual such as myself or personalized care you now have a different level of privacy writing anonymity.
In that to be taken care of all the algorithms are very similar so then that’s the big piece we got to come down to it,
understanding the context of the information understanding the context of the use and then how do we protect the Privacy inside of that context.
Erin K. Banks:
[2:53] So do you think that’s actually going to happen though do you think that privacy is going to be you know taken care of after the fact that I feel like security has always been an afterthought and I still have this concern that it’s going to continue to be an afterthought even after we start implementing AI.
Carey James:
[3:07] Well I agree right solace,
meet me on another topic I think we’ll talk about it later the European Union right in their data protection act acts and the new one that they’re putting out gdpr it’s around that event right it’s around trying to put data,
home security in the Forefront analytics as you know where it’s near and dear to you’re in my heart you know analytics The Last 5 Years you know up to really the last year,
analytics was about free reign the information right go look at the daytime if you wanted to do protection of data what you did is you built sideload little PODS of information only gave one or two people access to data so you were using.
You know basically almost personal security measures.
However we still had access to all the data that was inside of there so you know if I was going to be nefarious I was going to be nefarious and I had access to all the information.
So that’s one of the things were looking at now in the analytics space is is how you actually unlock analytics while protecting.
The consumer Intel there are more and more companies.
We’re seeing it in financial services drastically Healthcare another big one Robbie scene in,
Europe right lower also seen an Asian Pacific so what that tells me is It’s Going Global it’s being led by certain places,
but at the moment security still is the afterthought right but more and more companies are shifting now to how do I protect my data.
[4:37] While still allowing.
You know these machine learning algorithms even data scientist Business Report how do I make sure that you know Carrie,
doesn’t get access to Social Security numbers cuz he’s inari’s a CSR and not a financial services rep.
Rob Hout:
[4:55] Pictures of a cousin to that topic cry so there’s a security to the data and access to the data does also ethics and use of the data so I might have rights to it or might be the right person to access that but.
[5:09] There’s going to be a.
[5:10] Governance around how I use it like the old don’t be creepy with data right even if it is secure.
[5:24] And I’m the only one that has access to it.
Brett Roberts:
[5:26] Yeah I also you make a great point where where is it ethical thing on the part of the organization versus a regular Tory singing and I think.
[5:35] How do we Inspire no more.
[5:38] Cool thought of as cold habits versus using regulations to Define everything across the board cuz when you over regulate you stifle Innovation you stifle the ability to progress.
[5:49] To appoint so how do we do use ethics as a way of ensuring privacy versus regulations.
Erin K. Banks:
[5:56] Yes that’s interesting so that brings me up to the second topic that I thought was really great article and it was titled how to collect worker data without creeping out your employees and I love this cuz,
recently the company they work for it had a survey and sometimes I get nervous about,
answering those they say that they’re not a mess but it was a question whether or not they are not a mess and I know as we’re in this new realm of,
filling out Health surveys and you know asking questions about how often I drink or smoke or how often I work out and they said it’s for your benefit but I just wonder what they’re doing,
with the data after the fact and you know are they using it against me and therefore increasing you know Premier as we know that they increase prices.
Trident based on the device that you’re logging into or how long you stood in front of a device in the numbers and prices can change depending on how much time you spend with it so.
Me know if there’s any one of my thoughts about.
You don’t work or date of your company grabbing date about you and what they’re using in tracking all of your information like again like how often you’re on the Internet or surfing the web versus doing work like do you guys think about that when you’re working and filling out these forms and his health kind of things.
Rob Hout:
[7:02] I think the topic came up pretty clear recently wasn’t initially an employee thing but the whole Twitter verification Fiasco pit.
[7:10] we’re going to start looking at your behavior outside of Twitter.
[7:14] What are you doing and your offline life that might affect you having a little verification check mark right to know if an employer am I looking at my employees activities outside of the job.
[7:24] That my might affect my opinion of them or what kind of service is I give them or allow them to do that’s pretty frightening.
Carey James:
[7:31] Yeah great right inside to that point to inside and outside the organization’s right so you guys remember this the little,
ride share service Ben and all of a sudden that that use of privacy right the context that back to the ethical comment,
another gathering data to understand you know the drivers of patterns excetera,
but now are you using that outside the context we’ve agreed for it to be used in and now privacy comes into play right so that’s I think,
is the conversation there in like most things in human nature is going to come down to his is there a benefit you know for me it is the individual.
I’m with my company doing this and how how are they using it information and are they using it in the context of the agreement right that’s going to be,
choudrant as Rob said earlier right what’s the ethical use that information that ethical use all the data in context of why it was being captured,
is definitely one of the big things Paramount to as much as am I authorized to see it am I authorized to use it for this context.
Brett Roberts:
[8:44] Yeah I completely agree and have a example of an organization I used to work for where they realized how valuable the data was in.
[8:55] Auditing expenses.
[8:56] And they started scoping out all these really interesting ideas and how can we ensure that everyone’s playing by the rules with expenses but they got to the point where they can take a setback is this ethical is this too big brothers that too creepy.
[9:11] Too far into our employees lies and and what they do to try and limit.
[9:18] Potentially bad apples write a huge role in how do we get into a creepy Factor 100.
[9:30] Yeah I mean I’ve seen it before and I was part of some of those conversations where they were all ready to go into new implementing this.
[9:37] Hey how’s this going to impact our employer please perception of us as an organization so I think that’s another big thing as well.
Erin K. Banks:
[9:43] Yeah yeah I mean that was it was really I don’t know I just find it fascinating and I hope that companies are thinking about that right as they collect all the state and that they’re protecting it correctly which again leads to the second third topic which I care you have brought up earlier is.
Is the Uno gdpr right to the general data protection regulation what’s happening in the EU we have a couple years to get through it but it’s obviously discussion that’s come up a lot recently.
In my world right it when we talk about security we talk about dating get in their hands and and I just we were doing a.
Hello about this I was doing I don’t know what work event that I was on a panel and you know it was interesting because they were bringing up.
What are the people in the panel were just saying that regulation is really great and then I just feel like will regulation.
It has its good things and it’s bad things but the point is regulation if if a company is going to get fine because my day to get stolen the fact is I’m the one that really has the biggest impact and I’m the one that gets hurt in the long run and does regulation.
Is it going to eventually stop that or people going to really do with it like they do with all risk and they said well it’s it’s worth.
[10:52] You know paying that fine versus doing all the protection because I just keep question whether or not gdpr is actually possible are we going to be able to you know delete every single amount of data about me that a company has said I feel safe along those lines.
[11:07] What do you guys think.
Carey James:
[11:09] Well I mean if you tell the right to be forgotten is a useful piece right but to your to the what we were talking about how do we use the information in the context of it if everyone elects to be forgotten.
ITunes data been anonymize to a point that you can no longer you know.
Understand who’s in who’s in the group or there’s no data there to utilize right so then how do you manage that relationship so there is that that balance I know,
yeah the right to be forgotten probably the easiest part of the GDP are to be taken care of.
You know that actually clean out the information from the user is that how you keep transaxle information about a person but have no you know.
[11:55] Information about who the individual is so there’s they’re still pieces that puzzle the other big portion of that is going to be as how how do we actually take and do the somebody nomination pieces under regulations in in one of the countries.
I’m ready to gdpr is the fact that if there are less than 20 transactions in a postal code.
Then the postal code might be thrown away because it’s considered to be here too small you cannot anonymize 20 individuals.
Or 20 transactions right so that’s that’s a big piece of it too it’s not only.
You know the privacy of information but it really does get down the Privacy can you you know can you reverse engineer who the person is it so that’s going to be a big portion of that the gdpr is that.
Protecting the privacy of the image will not disappearing the data yes there’s any masking there’s any filtering.
But it’s going to be that how do I understand the use of this information and in one transaction I can use a popsicle that has 20 events in it and the other transaction I cannot.
Because it now breaks that privacy barrier.
Erin K. Banks:
[13:03] So I know I will I just got also find it interesting because I keep thinking like.
[13:08] Is it has to be an iteration where they’re going to have to play with it they’re going up to see if it works and then recover you know it almost come back to it and revamp it because there can’t be a single answer for this like there can’t be a single way of solving this problem because it’s a large problem that again I feel like.
Once again we’re trying to solve a problem security aspect of a problem after the fact that we’ve already implemented all these capabilities with her our business and now it too.
Almost try to reinvent the wheel and I don’t know if I mean only time will tell whether or not this regulation really protect the people and what it protects them from cuz there’s always a debate always fun and interesting.
[13:46] I don’t know sometimes as much as I try to be pretty protective and quiet and to believe it or not and got to stay home you know.
Characteristics about me there’s also the point of will maybe if we just shared everything then there wouldn’t really be anything the Steeler wouldn’t be getting the wick worry about there just leave it all open and then just see what happens after the fact and,
put all of us on equal playing field I don’t know how I feel about it I just I just a question it and I think in or like I said only time will tell but I think it’s a it’s an interesting.
[14:15] Tactic.
Carey James:
[14:16] And there is a different pieces there right in the the levels of information and we are doing a project about 3 years ago with one of the people on our team was a millennial.
On for a retail or you know on e-commerce retail and they looked at the person across the table to the person so I can buy the privacy and pieces and says if you don’t already know this about me.
Why do I want to do business with you right I’m not a millennial you know.
Erin K. Banks:
[14:43] Oh I think you are.
Carey James:
[14:45] I’m not right but for me I don’t want that and then when it comes there and again or the context of the data maybe my retail transactions I’m okay with that right but my personal hell,
information I don’t want you know out in the marketplace that’s going to be the piece to I think right now into your point by GDP are kind of a blanket.
But you know where do we look at is there going to be restart you already have it in United States right we have HIPAA.
We have you know pii we have PCI personal Credit in your pipes that we have different regulations around specific types of information so that’s going to be the the big piece it again yeah I keep harping on it coming back to it but he’s the context of the information,
the context of a relationship with a data and then now you know what was what was I intending the company to do with that information when they collected it.
Brett Roberts:
[15:35] Yes so speaking as a millennial or maybe maybe on the line of the money I don’t actually know but I’m okay with.
[15:44] Certain parts of of my life being open I have nothing really to hide in for the audience out there don’t Google me you won’t have you want anything great but.
[15:54] I’m always reminded of the If You Give a Mouse a Cookie type of analogy right how far does it go to the point where there’s certain things that I don’t want out in the open so I think.
[16:04] There there certain amount that needs to be.
[16:07] He’ll regulated but with a blanket regulation like this I also like the other side of the of the story where if you go all-in how easy is it to recalibrate.
[16:17] Tickets that sweet spot where you’re protecting but also allowing companies to.
[16:22] Progressed and I don’t know if a blank regulation does that and I don’t know how hard it is to change that regulation versus trying to do an act so maybe lighter type of things to to get to wear that sweet spot is.
Erin K. Banks:
[16:33] Which is interesting to that point of iCarly will the Millennials vs not right to eat is expectation as these rules regulations every create are created by you know old stodgy people or you know down the road it’ll start.
You know being not as important or not necessary to be really interesting to see where it goes cuz I do.
Agree that the expectation for others that have grown up in a digital environment within an iPhone in their hand it’s just a different expectation of what you’re getting from your business I’m from your life from your restaurants in a company’s like that so I think it’ll be really,
interesting to see where that goes so.
On that note, I wanted to get some of your input I love for you to tell us a little bit about yourself and about blue Talon and and what you do.
Carey James:
[17:22] Sure I’m so myself as you guys guess I’m not a millennial.
I’ve been in I’ve been in and around information for over 30 years right so we are background.
I’m started out as a EDP auditor for those of you who don’t electronic data processing auditor for CPA firms I loved the combination of information,
how to protect the data and how to actually use the data in the business right so that translated it to me and Cheryl Long Consulting career.
And now I’ve spent the last 7 years really focus on analytics right before they were really the cool thing to be doing in the tools that we had.
I’m in a really limited are the ability for us to do things unless you had you know one of the crazy super computer is where you actually had to HPC right those only exist in lab,
interior today we change that model and.
In that that space of analytics I really saw that you know the move towards self-service the drive to Ward’s you know you delete a free utilization of information and in there.
You know as a product manager for a sweet in that.
Environment I noticed that the real key to unlocking this was you know the bility to allow people to have access to the date of their authorized to protect that the sensitive in private data were talking about.
That’s what blue Talon does right so we do something called Data Access Control we work with authorization.
[18:56] And we work with him in crypto tools to let you know do some protection of data but encryption,
you know it’s really good for about 3 to 5% of your data on your database is right and get beyond that the,
the policy of creeks near maintaining encryption and decryption and even the policies around how to drive it gets very much like the old views and they are dbms is anybody ever did of you base security.
You know you may wind up if you had 10 groups you wanted up with 10 views in the system and you’re actually physically maintaining these views even if they’re materialize.
So that became a bottleneck but that didn’t even exist in the outside of the house Rachel how did you do this without creating files you basically.
Nina perpetuated a a bad practice of copying data protecting data by creating individual silos of it and that did not really.
Allow for freedom of you straight so now I can actually go in with blue Talon and we do we turn this into policy so we’re policy enforcement model,
so you write policy centralized and we have enforcement Point based on the syntax of the different data platform so high then Paula you know greenplum postgres oracle.
We’re in the progress process of developing one for teradata what this allows people to do is actually do their definition of their policies once.
In a central space of the enforcement of those policies and inconsistent enforcement of those policies across the different data platform.
[20:28] So now you actually do get the freedom from a data scientist data analyst I troll to be able to.
You access information that is relevant to me I want to answer my question but still protect the sensitive information,
it is a company in an organization we talked about data Mobility right putting data on the right platform for its ability in a right fit right cost right analysis,
well you didn’t have that before right so now we actually allow that to happen as well so the key to self service the key today to Mobility is Access Control.
And that’s where we play.
Rob Hout:
[21:04] Another Billy Idol log in with that data catalog by policy I can now restrict your view at the particular content at that later as opposed to having to give you access an individual data piece.
Carey James:
[21:15] Correct.
Erin K. Banks:
[21:17] Yes it what are some of the projects that you guys have been working on it through town.
Carey James:
[21:22] I’m so broke in a couple of different project some very recently I’m too here in the United States with big financial institutions and one across actually in in Europe.
I’m with a financial institution as well so it said earlier right financial services are you know really being pushed heavily.
With the privacy and protection of information but they are struggling to allow you access to this information cuz they want to beat The Hobbit,
I hope you know I treasure Trove of information about customer transactions events,
but they are really at the Forefront even ahead of the regulation of how do we use this information but protect you know cup company sensitive information or pii type data PC data,
so I can think of it as a you know a model and it’s a protection model across my environment,
versus having to go in and say okay we’re going to remove credit card numbers from this field are we going to remove,
Social Security numbers were going to create you know five different views of social security number for this table and the 10 different tables that exists and I got 50 different views across my data system.
Now I can go in and say no I want to write a policy that says when I see social security number I do know for a CSR going to mass call with the last four,
for this organization for management that they’re completely you know denied access to Social Security number.
And so again and based on policy based on who I am what I’m doing in the context of what I’m trying to do with the data we can apply policies.
[22:58] That control that sensitive in private information.
Erin K. Banks:
[23:03] No I went to the last time I saw you I think was I want to say strata data conference which was here in New York City like it was this year and when we were talking and we were discussing everything you introduced me know if it was like,
DeKalb I think it was her dcap can you give me like more.
Carey James:
[23:20] Yeah so it’s a Gartner,
one of the Gartner quadrants right so data-centric access and protection so what is focusing on what we were talking about today right so there’s multiple layers of security right so there is security from a network perception perception I went to prevent people from getting,
into my network well you know we,
the richest we’ve seen recently we all know people are in the network so that’s no longer you know ballot then we had views where,
what we’re going to create all these years I’m going to maintain these different types of security places in you were going to encrypt data Albright you can encrypt certain pieces of information,
but if it’s stolen credentials right then even once I had that I can actually get to the encryption keys and I can now decrypt data.
So yep going credentials it’s a bad thing right so what D cap focuses on is how do you actually focus on protecting the information and not access.
You know my taxes to not be no connection to body actually for sex,
access to the data so in the case of you know for our system if we deny you access to the Social Security number there is no option key to steal if I’m asked for the last four it is actually an in-flight mask.
So we are actually you’re protecting that data we allow you to know that a equals a but we don’t you would not you don’t know what a is so.
That’s how we protected information so we’re focused on protecting the use of the daytime that’s Roadie can’t really focus is on his protection of the data at the point of views.
Erin K. Banks:
[24:59] So what does that mean like technically from like an analytics perspective right so how do I know it’s always that question or that debate about Will and.
[25:09] You know the millennial brought that up even a little bit before like there’s a there’s so much more that you want to know about me but then also maybe in some cases I want to protect it so how does a company find that like almost that’s fine line,
between the data analytics and utilizing data so that there are no restrictions and making sure you know I appreciate the concept of Ethics right and that they’re going to do the right thing but you can’t always guarantee that people are going to do that right so how where is that fine line and how do you protect and how do you,
how do you use those think that certainly have that analytics perspective so I can still.
Make sure that my business is growing then I’m creating new products and services I don’t understand what my consumers are looking for in those capabilities.
Carey James:
[25:48] Sure so let’s take an example like an account system right so I’m,
pick any company retail in a telecommunications carrier whatever I’m going to have information about the customer might have information about what they’re doing inside that customer information I also have do we’ll have things like credit card number I will have social security number,
or some type of identifier I have street address different types of information.
About that user so I do want to know who you are you know who Terry James is why does he doing you know how the interacting with my organization.
But what I don’t want to do is you know have a breach of where I am,
allowing Carey James is private information credit card number street address social security number again back as examples to be,
you know out on the open market place and so,
again the way to do that in the past was you created either you know multiple views of data that had this information protected you had different files of this information in the head to Pico system different cables inside the system.
And so if I forgot.
You’re literally forgot to do this somewhere then you run and you rented you a you have an exposure right you have a breach.
Policy model the way we do it would be to Central life policy definition with.
Enforcement point we actually intercept a query in what I mean by that is if I typed select star from account.
You know typically the day you because everything back.
[27:20] And how you protect that was we talking about you having to you and I love you would say oh Carrie trying to trying to select my accounts but he’s gets of you that doesn’t have social security number it has it all to me the last four words for visible.
And then we go okay Aaron has another.
View of this data and she’s a financial services rap so she can see all of these social security number and Rob is a manager he can’t see anything so you got to do that,
then you you have that exposure so with the way we handle this we do give that freedom.
To the data right so you reprovision People based on who they are and the attributes about the information in the context of other trying to,
utilize it and then we would by default look at my policy and Carrie is this and we we actually modify the query in flight.
I’m so we submitted to the database you don’t have to understand it you know Carrie get this mass for the policy does that we actually talked to the database and we bring back,
what’s called a compliant results at so in my case it would come back with the social security number Mass out so for the last four and your case it would come back with a social security number in Rob’s case it would come back with the column deny,
we would just put One X in it right for this will say it’s a numeric was making An American Tail we actually put a zero in it so your Downstream processing wouldn’t break.
Cuz we don’t want to remove social security number cuz it may be other things that are working on it that but he’s actually denied access and so is that results that comes back to him it’s got a zero right in this case of a numeric field.
[29:01] And therefore I never get to see the data right but the actual predicate and what’s happening the database.
Still happened right so join still work you know knowing a still equals a still works but it’s when we when we surface right when we display that resultset that’s when we protect the information.
Rob Hout:
[29:20] Because it is another positive aspect to this to write that where they can carry you.
[29:26] Touched on the subject a little bit so one of the positive outcomes of being able to have a policy-based security approach over top of a single Source or a single source of the truth the fact that I don’t have.
[29:37] Like the proliferation of junk copies of data has multiple multiple copies that are slightly reduced or pieces pulled out and I’m just not feeling my data center with John.
[29:47] Right I’ve got a single source of the truth with the nice security policy layered side on top is it that kind of how you see this or is this.
Carey James:
[29:56] What is a positive benefit so you absolutely have that right you know.
So I you know I work for Dell EMC in the past so I’ll get it in your sister is perspective in but we do want people store in the information in the the most appropriate.
Waiting for Matt and yes what this does is it does remove that need right not completely right it will never remove the entire need to have.
[30:20] Copies of data for 4 backup and protection other pieces but utilizing copies and redactions of information.
For security that’s absolutely where we see this you know moving away from.
Movie towards this type of a you know whether be a golden coffee or a source of the truth it’s now I’ve got,
yeah the same I can have the same data I’m no longer arguing about where did your data come from where to my data come from which you know we know never happens.
But then we also get to that point of when you move data from system a to system B.
Right that we actually the policies actually can follow it right there’s a process and procedure where you can actually,
move the date of the most appropriate storage medium write the most appropriate data platform and not have to worry about okay now that I move data from here to here,
hey Tabby right B doesn’t have the type of security information so I don’t know I can’t do that.
Right and so by taking the data the date eccentric access protection a layer from the actual data application.
Right now we actually allow you to apply different information across.
The different platform so now you can make that decision based on no business process policy cost-effectiveness vs. security capabilities of the underlined siloed platform.
Brett Roberts:
[31:44] You took a policy in.
[31:46] Feel important policy but I think that being able to set that policy into fine with that policy is this critical right so can you just talking about,
the importance of having a role for a chief data officer or a chief did a Governor’s officer and it how old that is critical to this whole security and in policy based approach.
Carey James:
[32:05] I absolutely right and because it’s his people process and technology so we’re we’re the technology side that allows it to be feasible.
What if you do not have like a governance process in the governance board in place then you don’t know what types of information you want to protect,
you won’t have classifications of data therefore you won’t be able to actually go okay I know that carry is a CSR I know the CSR should not have access to the you know,
only the only have access to the last 4 digits of the social security number they should not have access to credit card you know whatever those rules are have to be to find,
buy a people in a governance board so that Chief data you know chief petty officer Chief governance officer is important in helping to companies set their strategies,
right in and helping those companies put together the right policies and processes in their case right to actually,
make those real and that way you know what you’re trying to follow so this goes back to your point,
Erin up are we doing security after the fact or we trying to now be more proactive those rules allow you to be more proactive and defining types of data and classifying it so you know what policies are needed.
Versus trying to play you know catch up and going okay whoops this is security is a sensitive data therefore we got to protect it,
this is the other model moving forward saying no we’re going to Define our policies were going to find how we’re going to manage you control sensitive data then when a data classification hits this we already know what we’re doing.
[33:39] Versus trying to understand you know after the fact.
Erin K. Banks:
[33:43] Yeah and I get like completely and utterly surprised when there’s so many large companies and I mean all companies could utilize a cheap did Officer cheap that are governs officer because if they’re going to implement it did analytics project and they don’t understand,
their data and they’re not,
look at the classification or how even customer names are written out our address is are things along those if they don’t look at their data like it has a Valium,
but I think that their outcomes are going to be less effective because they don’t really either haven’t Creighton like a symmetry across all of either the divisions or.
Just even within the entire company and it just fast and I try to always ask.
Companies that I had that I talk to you whether or not they have a chief data officer and a lot of times that they don’t and they are a lot of more incredibly successful data analytics and I keep thinking like.
Well you know I can only imagine how much more impact you would have if you had somebody that literally.
Need to put rules and regulations in place about the date and how it’s going to be used so I hope you know they keep talking about it being a new position in a lot of companies are taking it on I don’t I hope that people see the advantage of the benefit of it.
As a whole.
Carey James:
[34:49] Yes I think the big thing there is I’ve been guilty of making this comment in my,
in the past right we always say people don’t do you don’t do governance for the sake of doing governance which I think is true but,
you know with that said I think they’re I’ve seen more and more companies now starting with it they have a chief governance officer or not they’re putting in,
governance boards and the one thing I’ve seen kind of flawed in the chief data officer is they bring them in and they only focus on,
you know the use of the day though. What are we doing with this information how do I get better marketing campaigns Accentra again versus looking at it from a holistic perspective.
Which is how are we using this data what is the contacts relationship of this data and my customer and you go back to the very early Point are we actively using this in the right,
manner but if we do find that upfront we can actually have that Freedom of Information right I can have my data scientist to look at marketing campaigns a different types of information without the fear.
But I’m going to expose you know sensitive data to the world but they need that has to be a conscious decision and then there needs to be interviewed epr kind of puts in place for this there is there their compliance officers I have to come on board,
for the controllers Orsini here more than us as well right of the sea so so cheap information in security officers.
[36:20] That role is also be a big out there but we seen in the past what I’ve seen in the past is everybody treated him Asylum.
Write different events and entities I think what we’re starting to see,
I think we’ll continue to see where is the success will come into is that you see these all as a.
Interdisciplinary unit to achieve the outcomes and not as individual events that you know are to be over, or to outflank.
Brett Roberts:
[36:48] Yeah I’ve seen that as well and a couple customers where where they are collecting the data first or bring all the date in to see what repository or they’re getting their data strategy but then stage 2 or stage 3 years.
[37:00] We need somebody to manage the entire end-to-end.
[37:04] Hot process and policy of the data but it’s an afterthought almost and I think that we need to add in organizations need to make that part of their stage 1.
[37:12] And it didn’t look Stern United States two or three to be the most successful and get the most out of it.
Erin K. Banks:
[37:18] No I totally agree thank you so much Carrie for your time and for answering all these questions we have just a couple more for you before we let you leave what year do you think that Skynet will go online.
Carey James:
[37:32] I will ask John Connor has anything to it. I’m before they come online.
Brett Roberts:
[37:40] I think that’s the second best answer I’ve heard to this yet today but the second best to that.
Erin K. Banks:
[37:47] That’s funny I’m so if you were going to buy me a book Harry what would it be.
Carey James:
[37:53] Are we going to buy you a book Miss Banks so I think that there’s a couple of them out there but I think one is going to be important to this kind of conversation,
right there’s two of them out there one is digital disciplines and the other is platform Revolution right so it’s starting to think about this we talked about as ecosystems and you know start to finish is not.
Is we had in the past right,
starts and stops along the different mechanism was seen this as a eventual flow.
And again not as you know thanks be over, right so governance nobody does governor governor sake agreed,
but instead of just having a government policy in place you actually have the themes word protect the information that needed to be there and that comes in at the very beginning right not at the end.
Erin K. Banks:
[38:41] I like it I like it so what kind of music are you listening to right now.
Carey James:
[38:47] Music of your sweet voice notes,
my favorite you know so yo yo get my I went to high school in the 80s right so I am still a Metalhead I’m so and now they call that classic rock but also.
Still my favorites out there.
Erin K. Banks:
[39:06] LOL so what’s your favorite piece of useless technology right now.
Carey James:
[39:10] My Macintosh computer.
Erin K. Banks:
[39:13] And what is your biggest Money Pit your Macintosh computer.
Carey James:
[39:17] My Big Money Pit right but my biggest consumer of my fines now or my two teenage daughters and getting them prepared for college so that’s where most of my funds go to these days.
Erin K. Banks:
[39:32] That’s awesome I’m so are you going anywhere interesting soon.
Carey James:
[39:36] Other than here now so I’m actually finally having my knee fixed right after Thanksgiving so I’ll be I will be,
interesting place for me will be from the couch to the refrigerator but that’s about it.
Erin K. Banks:
[39:53] Yeah so on that note I’m just curious of what is your 2017 of Delta status.
Carey James:
[39:59] 2017 Diamond 2018-2018 I’m diamond and 2099 5000miles short of diamond.
Erin K. Banks:
[40:09] Really you’re already in 2019.
Carey James:
[40:11] Yes.
Erin K. Banks:
[40:14] That’s crazy no wonder you need her that’s nuts that’s that’s.
Carey James:
[40:17] I am I family agree with you so the great news is the last four months that is on drastically changed with the the new role with two blue talents out.
Erin K. Banks:
[40:28] That’s good although you’re going to miss it though once you start having to sit in coach it’s going to break your heart.
Brett Roberts:
[40:34] Have you had the the Porsche pick you up by the plane and take you to the lounge yet.
Carey James:
[40:40] I’ve not had to pick me up take me to the lounge I’ve had to pick me up and take me to the next gate cuz it was a couple concourses away so they didn’t pick me up and I’m driving straight to the next plane.
Brett Roberts:
[40:51] That’s when you know you’ve made it right has as far as the road warrior.
Carey James:
[40:55] I live in Atlanta and I very seldom ever change planes in Atlanta but I was flying through Atlanta going somewhere.
And you know is happens in the summer,
I’m in the South right weather delays and I was really really tight connection it was like me are just walking up to the front you know,
the lady was standing there in the jetway.
Are you mr. James I’m like yeah she’s like come with me as we actually went down the stairs were they take the bags got into the Porsche drive me to the next one walked up.
You know and they had the um.
They they just there and they should have to verify my stop and check me in and I was on the plane so I mean it was you know it was a very nice experience.
Erin K. Banks:
[41:44] That’s awesome that’s awesome idea I was in one of the first times I’ve ever done that in at New York at Kennedy so that was pretty cool I was as exciting they took me to the lounge great experience I highly recommend but it means that you fly wait wait.
Carey James:
[41:58] Way too much.
Erin K. Banks:
[41:59] Yeah so I’ll ask question what show are you binging on right now.
Carey James:
[42:03] I’m actually not binging on any shows cuz I was just being crazy cuz I was able to catch up on my Game of Thrones which I you know is my favorite you could help me all you want.
Erin K. Banks:
[42:14] I’ve never watched it I mean that’s why I just never.
Carey James:
[42:16] Now you got a binge on it there’s a couple people shows of people trying to get me to binge on and I’m just right now I’m kind of refusing to take on a new one just.
Cuz I’m trying to get a little bit of time back for me I’m actually back into reading I’m going to my JRR Tolkien for like the $87,000.
Right Touch I haven’t read it in like a year-and-a-half two years I’m trying to go through that now and get back into doing a little more reading versus watching but.
Erin K. Banks:
[42:43] Yeah I would love to do them.
Brett Roberts:
[42:45] Okay so I got one question for you as well we try to ask some every show who is your favorite bearded person from history or current day but you had a name a person with your favorite. Who would that be.
Carey James:
[42:57] All my favorite beard that’s an actual interesting question wow.
Erin K. Banks:
[43:04] Injerto can have one.
Carey James:
[43:06] All talking had one right inside his mythical characters have beards but their mythical characters I’m trying to think of an actual you know person I like Did JR talking did have one but.
Brett Roberts:
[43:16] We can’t we can do school character so I Gandalf is always a pretty popular one.
Carey James:
[43:21] Yeah I can get us a really cool am I think for me it’s it’s interesting is on.
[43:26] My daughter is going to yell at me now cuz I’m actually drawing a blank he is actually one of the German philosophist.
[43:34] And I am just completely blanking and she’s him sitting on the other room listening to me and then yell at me after the.
Erin K. Banks:
[43:40] It’s alright we’ll put it in the notes cuz everyone’s going to be wondering who it was.
Carey James:
[43:45] Yeah I’m off I’ll get that to you I’ll find out who it is and he’s actually pretty cool right cuz he some of the the modern Concepts and it’s not Freud listen to Modern concepts of how we actually younossi can interact.
[43:59] Nonito was think you can slavia nor Russian but oh goodness gracious give me give me.
Erin K. Banks:
[44:08] Pumpkin bread.
Carey James:
[44:09] No did it two seconds and I will and I will fight until hell no I was yelling at my daughter around the corner literally so.
Brett Roberts:
[44:17] Wilhelm group okay we’ll have to do some research on that.
Erin K. Banks:
[44:21] Yeah absolutely will thank you so much I really appreciate all your time now what is the best way for us to find you on social media or other mediums.
Carey James:
[44:31] You can always find me on Twitter at Carey James 33 set Carey James the number 33 you can also find me on LinkedIn again Carey James you can find their assets that’s pretty much it.
Erin K. Banks:
[44:46] Well thank you guys so much for your time I really appreciate it and I wish you a happy holiday.